#russian-agent

[ follow ]
World news
fromFortune
1 hour ago

CIA deception campaign in Iran helped the spy agency uncover the location of the downed F-15 airman, who was hiding in a mountain crevice | Fortune

The U.S. successfully rescued two aviators from Iran after their fighter jet was shot down, employing a complex extraction strategy.
#cybersecurity
fromSilicon Canals
21 hours ago
Information security

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

fromTechCrunch
2 days ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

Information security
fromSilicon Canals
21 hours ago

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

Mikko Hyppönen has transitioned from cybersecurity to anti-drone defense, focusing on systems for law enforcement and military clients.
EU data protection
fromTechCrunch
2 days ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromWIRED
16 hours ago

The Hack That Exposed Syria's Sweeping Security Failures

Syrian government accounts on X were hacked, revealing significant vulnerabilities in the state's cybersecurity practices.
Information security
fromThe Hacker News
2 days ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Privacy professionals
fromTechRepublic
6 days ago

Iran-Linked Hackers Breach FBI Director Kash Patel's Email, Leak Messages Online

An Iran-linked hacking group breached FBI Director Kash Patel's personal email, releasing non-sensitive information as a retaliatory cyber attack.
Information security
fromSecurityWeek
2 days ago

TrueConf Zero-Day Exploited in Asian Government Attacks

Chinese hackers exploited a zero-day vulnerability in TrueConf software to attack government entities in Asia, allowing execution of malicious code.
#russian-intelligence
Privacy professionals
fromNextgov.com
2 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Artificial intelligence
fromNextgov.com
4 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Media industry
fromThe Cipher Brief
3 days ago

Iran Is Building the Disinformation Architecture of the Future-Right Now

Iran's disinformation tactics demonstrate the potential of AI in conflict, emphasizing speed, encryption, and narrative manipulation.
fromwww.dw.com
3 days ago

Hungary's Watergate: Secret service spied on opposition

Many have described it as a 'return to dictatorship and Communist times.' The intelligence service is said to have tried to recruit technicians in charge of maintaining the party's IT system, in order to access internal party information and use it to rig the election.
Europe politics
France news
fromwww.independent.co.uk
4 days ago

Russia demands France release woman arrested for suspected espionage

The Independent provides critical journalism on various issues, emphasizing the importance of accessible reporting without paywalls.
#ice
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
#axios
Node JS
fromAxios
5 days ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Information security
fromTechzine Global
4 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Node JS
fromAxios
5 days ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Information security
fromTechzine Global
4 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
UK news
fromwww.independent.co.uk
6 days ago

Russia expels British diplomat from Moscow over spying claims

The Independent provides critical journalism on various issues, emphasizing the importance of accessible reporting without paywalls.
fromThe New Yorker
6 days ago

The Spy Who Helped Stop Iran from Getting the Bomb

Chalker claims that during his time at the C.I.A., he was instrumental in persuading Iranian scientists to defect, which provided crucial information that 'prevented Iran from getting a nuke.' His operations involved complex strategies and a deep understanding of the scientists' motivations.
Washington DC
World news
fromThe Washington Post
1 day ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
#espionage
Germany news
fromwww.dw.com
1 week ago

Germany detains two of suspected spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Germany news
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromwww.dw.com
1 week ago

Germany detains two suspected of spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Germany news
fromwww.dw.com
1 week ago

Germany detains two of suspected spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Germany news
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromwww.dw.com
1 week ago

Germany detains two suspected of spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
#iran
Privacy professionals
fromAxios
5 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromWIRED
5 days ago

Iran Threatens to Start Attacking Major US Tech Firms on April 1

Iran's IRGC plans to attack American companies in the Middle East in retaliation for the killing of Iranian citizens.
World news
fromEngadget
5 days ago

Iran threatens imminent attacks on US tech companies in the Middle East

The Islamic Revolutionary Guard Corps threatens to target major US tech companies in the Middle East, urging employees to evacuate for safety.
Privacy professionals
fromAxios
5 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromWIRED
5 days ago

Iran Threatens to Start Attacking Major US Tech Firms on April 1

Iran's IRGC plans to attack American companies in the Middle East in retaliation for the killing of Iranian citizens.
World news
fromEngadget
5 days ago

Iran threatens imminent attacks on US tech companies in the Middle East

The Islamic Revolutionary Guard Corps threatens to target major US tech companies in the Middle East, urging employees to evacuate for safety.
Russo-Ukrainian War
fromwww.theguardian.com
5 days ago

Russia slowly trying to splinter its internet from rest of world, analysts say

Russia is gradually isolating its internet from the world, impacting millions through mobile blackouts and restrictions on essential communication platforms.
UK news
fromwww.bbc.com
6 days ago

Russia expels British diplomat over spying allegations

Russia expelled a British diplomat over alleged spying, escalating tensions in diplomatic relations between the UK and Russia.
Russo-Ukrainian War
fromwww.businessinsider.com
4 days ago

Ukrainian troops showed 'greater tactical imagination' than Western trainers, British officer says, pointing to their ambush tactics

Ukrainian soldiers demonstrate greater tactical creativity and flexibility compared to their Western trainers, particularly in ambush tactics.
#north-korea
fromFortune
3 days ago
Information security

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

fromDevOps.com
4 days ago
Information security

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

fromNextgov.com
5 days ago
Information security

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

Information security
fromFortune
3 days ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Information security
fromDevOps.com
4 days ago

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

North Korean hackers hijacked the npm account of an axios maintainer, publishing malicious versions that installed a remote access trojan.
Information security
fromNextgov.com
5 days ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
Information security
fromTechRepublic
5 days ago

New North Korean AI Hiring Scheme Targets US Companies

A North Korean operative attempted to infiltrate a cybersecurity firm using a stolen identity and AI-generated resume, highlighting vulnerabilities in hiring processes.
World politics
fromNextgov.com
3 weeks ago

Russia-linked hackers appear on Iran war's cyber front, but their impact is murky

Russia-linked hacktivist groups supporting Iran have increased cyber activity against U.S. and Israeli targets during the Middle East conflict, though their impact remains unclear and largely unverified.
Russo-Ukrainian War
fromwww.dw.com
1 week ago

Russian students duped into signing contracts with military

Students in Russia are being recruited for drone units with misleading promises of safety and benefits, often leading to dangerous deployments.
Privacy technologies
fromTechCrunch
3 weeks ago

Russian government hackers targeting Signal and WhatsApp users, Dutch spies warn | TechCrunch

Russian state actors are conducting large-scale phishing campaigns targeting Signal and WhatsApp users, particularly government, military officials, and journalists worldwide, using social engineering rather than malware.
Information security
fromThe Hacker News
2 days ago

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Drift decentralized exchange lost $285 million due to a sophisticated attack involving unauthorized access and social engineering.
#malware
Information security
fromThe Hacker News
3 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
fromSecurityWeek
3 days ago
Information security

Sophisticated CrystalX RAT Emerges

CrystalX RAT is a new malware-as-a-service combining spyware, stealer, and remote access capabilities, promoted on Telegram and YouTube.
Information security
fromThe Hacker News
3 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
#phishing
fromThe Hacker News
4 days ago
Information security

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

A phishing campaign impersonating CERT-UA distributed malware called AGEWHEEZE targeting various organizations in Ukraine.
Information security
fromThe Hacker News
2 weeks ago

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications targeting individuals of high intelligence value.
Information security
fromThe Hacker News
4 days ago

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

A phishing campaign impersonating CERT-UA distributed malware called AGEWHEEZE targeting various organizations in Ukraine.
Information security
fromThe Hacker News
2 weeks ago

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications targeting individuals of high intelligence value.
Russo-Ukrainian War
fromwww.mediaite.com
2 weeks ago

WSJ Doubles Down on Report Russia Is Sharing Intel With Iran, as Kremlin Cries Fake News'

Russia provides Iran with satellite intelligence, advanced drone technology, and battlefield tactics to enhance targeting capabilities against U.S. and allied military assets in the Middle East.
Russo-Ukrainian War
fromLondon Business News | Londonlovesbusiness.com
2 weeks ago

Moscow internet shutdown after Ukrainian drone attacks signals Russia's return to Soviet-style control - London Business News | Londonlovesbusiness.com

Russia is responding to Ukrainian drone attacks by restricting internet access, controlling information flow, and tightening digital controls, resembling Soviet-era information management practices.
Miscellaneous
fromEngadget
1 month ago

Russia's recent blocking of Telegram is reportedly disrupting its military operations in Ukraine

Blocking Telegram and restricting Starlink degraded Russian frontline communications, reducing drone coordination and offensive capacity, and advantaging Ukrainian forces.
Privacy technologies
fromDataBreaches.Net
1 month ago

Ukrainian hackers uncover how Russian drone operators are using Belarus - DataBreaches.Net

Ukrainian sanctions target Belarusian leader Lukashenka for facilitating Russian attack-UAV control from Belarus and enabling strikes on northern Ukrainian infrastructure.
#russian-military-intelligence
#russia
fromwww.theguardian.com
1 month ago

A war foretold: how the CIA and MI6 got hold of Putin's Ukraine plans and why nobody believed them

William Burns had travelled halfway around the world to speak with Vladimir Putin, but in the end he had to make do with a phone call. It was November 2021, and US intelligence agencies had been picking up signals in the preceding weeks that Putin could be planning to invade Ukraine. President Joe Biden dispatched Burns, his CIA director, to warn Putin that the economic and political consequences if he did so would be disastrous.
World news
Miscellaneous
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russia's Way to the Gray Zone

Russian gray-zone warfare centers on non-contact war and expanded intelligence active measures, using cyber and cognitive tools to influence conflicts without direct kinetic attacks.
fromThe Local Germany
1 month ago

German spy chief warns of Russian threat to local polls

Elections in Moldova and Romania are recent examples, and we expect more hybrid campaigns throughout this election year in Germany,
Germany news
fromThe Cipher Brief
1 month ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
Information security
fromSecurityWeek
3 weeks ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
fromLondon Business News | Londonlovesbusiness.com
1 month ago

Fears Grow Kremlin Could Stage False Flag Operation - London Business News | Londonlovesbusiness.com

The assessment comes amid rising nuclear rhetoric between Moscow and Western governments over future security arrangements for Ukraine following the ongoing conflict. Analysts say Russian officials have amplified statements from the Russian Foreign Intelligence Service to reinforce warnings about potential nuclear escalation. Particular diplomatic pressure appears to be directed at the UK and France, which are leading negotiations within the so-called Coalition of the Willing on potential security guarantees for Ukraine after hostilities end.
Russo-Ukrainian War
fromLondon Business News | Londonlovesbusiness.com
1 month ago

Russia spies forcing Ukrainian to burn and bomb - London Business News | Londonlovesbusiness.com

The SBU says the enemy has ramped up these operations, using phones, messaging apps, and even online dating platforms to trick people into carrying out dangerous acts. The SBU said, "During such operations, Russian agents telephone or message people, posing as employees of the SBU, the Main Intelligence Directorate, NABU, the National Police, and other law enforcement agencies." "The Security Service of Ukraine once again calls on citizens to maintain information hygiene and to exercise caution in contacts with unknown individuals," the SBU added.
Miscellaneous
#apt28
Information security
fromThe Hacker News
3 weeks ago

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

APT28, a Russian state-sponsored hacking group, has deployed BEARDSHELL and COVENANT malware since April 2024 to conduct long-term surveillance of Ukrainian military personnel.
Information security
fromThe Hacker News
3 weeks ago

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

APT28, a Russian state-sponsored hacking group, has deployed BEARDSHELL and COVENANT malware since April 2024 to conduct long-term surveillance of Ukrainian military personnel.
Miscellaneous
fromLondon Business News | Londonlovesbusiness.com
1 month ago

Russian's rage how can we fight without Telegram, should we 'use carrier pigeons?' - London Business News | Londonlovesbusiness.com

Kremlin restrictions on Telegram and other messaging apps threaten Russian frontline operations by hindering battlefield communications and strengthening Ukraine's strategic position.
Information security
fromTechzine Global
3 weeks ago

Mass attack by Russian hackers on Dutch military personnel and civil servants

Russian hackers target Signal and WhatsApp accounts of Dutch government employees and military personnel by impersonating support chatbots to steal verification codes and exploit linked device features for remote account access.
Miscellaneous
fromRadioFreeEurope/RadioLiberty
1 month ago

Suspects Reportedly Detained Over Shooting Of Top Russian Intelligence General

A suspect and an alleged accomplice were detained in an apparent assassination attempt on GRU deputy chief Vladimir Alekseyev; Alekseyev survived after surgery.
fromRadioFreeEurope/RadioLiberty
1 month ago

Russia Accuses Ukrainian Intelligence Of Plot To Assassinate Top General

The agency, known as the FSB, also released more surveillance video footage, including a nearly minute-long clip in which the alleged shooter -- identified as 65-year-old Lyubomir Korba -- was shown confessing to the crime. In the video, which could be not be independently verified, the man said he was recruited ‌by Ukraine's SBU security agency in August 2025 in the western Ukrainian city of Ternopil, and underwent training in Kyiv. He said he was promised $30,000 in cryptocurrency if he killed Alekseyev.
Miscellaneous
Information security
fromDataBreaches.Net
1 month ago

Extorting the Extorters? Moscow man accused of posing as FSB officer to extort Conti ransomware gang - DataBreaches.Net

A Moscow resident was accused of extorting money from the Conti ransomware group by impersonating an FSB officer and threatening criminal prosecution.
Information security
fromArs Technica
6 years ago

New clues show how Russia's grid hackers aimed for physical destruction

Russian hackers aimed to inflict long-term physical destruction on Ukraine's power grid in December 2016, planning damage to be triggered during operators' recovery efforts.
Information security
fromTheregister
2 months ago

Don't underestimate pro-Russia hacktivists, warns UK NCSC

Pro-Russia hacktivist denial-of-service attacks threaten UK local authorities, critical national infrastructure, and other organizations, causing service disruption and recovery costs.
Information security
fromThe Hacker News
2 months ago

Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government

UAC-0184 uses Viber to distribute malicious ZIPs containing LNK files that deploy Hijack Loader and enable Remcos RAT intrusions against Ukrainian military and government targets.
Information security
fromArs Technica
6 years ago

New clues show how Russia's grid hackers aimed for physical destruction

Russian hackers aimed to cause lasting physical destruction to Ukrainian power-grid equipment by using malware designed to damage hardware during recovery, not a brief outage.
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
[ Load more ]